Pivot Into A Network Using A Compromised Router
Other
Access devices on the internal network after gaining shell access to an environment with constraints such as low storage/memory (eg. a Linux-based microcontroller or a router).
https://helich0pper.github.io/router_rce/